CN111245857A - Channel network steady state evolution game method in block link environment - Google Patents

Channel network steady state evolution game method in block link environment Download PDF

Info

Publication number
CN111245857A
CN111245857A CN202010053929.6A CN202010053929A CN111245857A CN 111245857 A CN111245857 A CN 111245857A CN 202010053929 A CN202010053929 A CN 202010053929A CN 111245857 A CN111245857 A CN 111245857A
Authority
CN
China
Prior art keywords
type
node
strategy
nodes
defense
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010053929.6A
Other languages
Chinese (zh)
Other versions
CN111245857B (en
Inventor
张佩云
李晨曦
汪丽翠
章一磊
张捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Normal University
Original Assignee
Anhui Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Normal University filed Critical Anhui Normal University
Priority to CN202010053929.6A priority Critical patent/CN111245857B/en
Publication of CN111245857A publication Critical patent/CN111245857A/en
Application granted granted Critical
Publication of CN111245857B publication Critical patent/CN111245857B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a channel network steady-state evolution game method in a block link environment, which is characterized in that node transaction in a channel network is modeled into a dynamic evolution game model based on a replication dynamic mechanism of a limited theory and a biological evolution process, the model designs a channel network dynamic defense mechanism based on an evolution game, the mechanism adds a defense strategy on a strategy space of a type I node, and considers the cost and success rate of attack of a type II node under the condition of deploying the defense strategy, and the defense mechanism can help the type I node resist the attack behavior of the type II node with a certain probability. The nodes of the model have the finite evolutionary learning capacity, and can dynamically adjust respective strategies according to different attack strategies of attackers to achieve effective defense.

Description

Channel network steady state evolution game method in block link environment
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a steady-state evolution game method of a channel network in a block chain environment.
Background
The security of blockchain based cryptocurrency (e.g., bitcoin, etherhouse) comes in part from the extensive replication of the block data, at the cost of limited scalability. One of the primary methods of increasing cryptocurrency size is to focus on moving transactions from blockchain to subchain by using point-to-point payment channels through which transaction parties can make a large number of transaction transfers and ultimately settle the net revenue on the blockchain to reduce transaction validation delays. Although the off-chain payment based on the channel network is fast, if one party exits the transaction and closes the channel, the two parties need to submit each operation of the transaction to the chain for processing, and the transaction on the chain not only needs a large transaction fee, but also needs a long transaction confirmation time (sometimes possibly several hours). The huge economic expenditure and the time cost make the channel an attack target of an attacker.
The channels are linked to form a channel network, and the transactions between two parties can be transmitted through the channel network. An attacker may launch an attack, such as a routing attack, on the channel network. In addition, nodes in the channel network can also become targets of attacks and be captured by attackers, and the internal nodes can launch attacks from the interior of the channel, can seriously affect the performance of the channel network, and even cause the whole network to be paralyzed. Therefore, the attack behavior of the internal node is effectively prevented, the stability and the safety of the channel network can be improved, and the transaction in the channel can be completed quickly and smoothly. Based on the idea of evolutionary game, the motivation of profit of the nodes in the channel network is deeply analyzed from the economic perspective, and the attack and defense strategies are designed on the strategy space of the nodes so as to effectively improve the stability and the safety of the channel network.
Giulio Malavolta and Pedro Moreno-Sanchez et al propose the concept of channels, and a large number of transactions can be carried out under a chain, so that the dependence on the existing channels on block chain transactions is reduced and the existing channels are mainly divided into two categories: a payment channel and a status channel, having respective transaction types.
(1) And (3) payment channel: the payment channel is intended to establish direct point-to-point payment, allowing both parties to maintain and update both parties' accounts privately. Each transaction need not be written on a blockchain account, and legitimate funds can be withdrawn from its blockchain at any time. The payment channel comprises a Spilman payment channel, a Lightning network, a duplex micro-payment channel and the like.
1) Spilman payment channel: jeremy Spilman first proposed a channel payment protocol based on the bitcoin system. The protocol realizes the instant confirmation of the transaction, and is characterized in that the sum of a transaction receiver is always increased in the payment process of a channel. The receiver only publishes the latest status in the channel to the blockchain, otherwise the receiver's money is lost. The channel payment protocol only supports one-way payment, and meets the situation that a single user pays a merchant.
2) Lightning network: the channel network is the earliest to form a payment network through a payment channel so as to improve the block chain transaction throughput. Lightning networks mainly contain two contracts: two new transaction types, the reversible sequence number Contract (RSMC) and the Hash Time Lock Contract (HTLC), are revocable when the sequence expires. The RSMC mainly implements a two-person, two-way payment channel, so that both parties of the channel can confirm the transaction in real time without chaining the transaction. The HTLC realizes that the transfer of any two nodes in the system can be realized through a bidirectional payment channel. The Lightning network scheme has the defects of insufficient efficiency and usability, particularly, in the two-way payment channel protocol, limited by bitcoin system scripts, in order to prevent one party from doing harm, the other party needs to store punished transactions of each previous round of interaction, and along with the continuous occurrence of high-frequency transactions, the cost for storing the transactions is increased, and great burden is brought to users.
3) Duplex micropayment channel: the channel network solves the problems of the two channel networks and realizes high expansibility for digital payment based on the bitcoin. Due to the use of the HTLC of the Lightning network, it is ensured that the transmission over the duplex micropayment channel network is secure and the payment cannot be restored. But only the security of the transmission process is ensured, and whether the participant has a malicious behavior cannot be ensured.
(2) A state channel: unlike payment tunnel networks that only support user-away-chain payments, state tunnel networks also allow for arbitrarily complex intelligent contracts to be executed. Status channels include Sprites channels and Revive channels.
1) Sprites channel: miller et al proposed Sprites' solution that improves the efficiency of Lightning networking solutions and solves the problem of excessive time cost for the user when cross-channel payment is unsuccessful.
2) Revive channel: the Revive channel is proposed by Rami Khalil and Arthur Gervais, a persistence mechanism in a channel payment network is realized, and a transaction participant in the payment network can safely transfer balance among the payment channels. However, in the security analysis of the Revive channel, only honest participants are considered not to lose any funds in the process of Rebalancing (Rebalancing) channel funds, but malicious behaviors of dishonest participants are not considered.
The channel network processes a large amount of transactions offline, and simultaneously uses the block chain as an arbitration platform to process abnormal conditions in the channel transaction process, such as the situation that two parties have a divergence in the channel state, and the like, thereby indirectly improving the transaction throughput of the system. With channel technologies such as payment channel and status channel, the number of interconnected nodes in the channel network may reach tens of thousands or even millions, and therefore, a transaction path from a transaction sender to a transaction receiver, which can realize stable and fast transaction, needs to be found in the decentralized channel network. The scheme of selecting working Flare, Landmark Routing and the like from the existing channel path can find that: the nodes need to obtain all information in the routing process, if all the nodes are willing to cooperate, a payment path can be found but cannot be determined as an optimal path through a routing algorithm under the condition of not considering dynamic joining or quitting of the nodes in the network. However, in practical applications, the tunnel network has a problem of being attacked, especially, an attack behavior is initiated from a node inside the tunnel, an internal attack usually seriously affects the performance of the tunnel network, and even the whole network is paralyzed, and an attack of an internal node is more difficult to prevent than an attack of an external node, and meanwhile, a traditional signature verification faces a failure problem in the internal attack. Therefore, it is necessary to analyze the stability and security of the channel network in the case where an internal attack occurs.
The relevant settings of the channel network are as follows: the channel is composed of a plurality of channels and nodes, each node has a transaction forwarding function, the nodes in the channel network are classified according to the behaviors, and the nodes are divided into I-type nodes and II-type nodes, which are defined as follows: the type I node is composed of participants with defense behaviors in the channel network; the type II node is composed of participants with attack behaviors in the channel network. Note that: both type I and type II nodes have cooperative and uncooperative behavior. Multiple channels may be established between two nodes by means of other nodes.
The usual channel transaction process can be divided into 3 phases: 1) in the initial stage, both sides establish a channel; 2) in the payment stage, both channel parties complete the transaction and update the channel state; 3) and in the channel closing stage, the two sides close the channel and redeem the own funds in the channel. An overview of the channel network is shown in figure 1.
As can be seen from fig. 1, the tunnel network enables the transaction initiator to perform transactions via intermediate nodes, e.g., node b may send a transaction to node f via node d and node e. Where the path from node b to node d, the path from node d to node e, and the path from node e to node f all have sufficient funds to forward the transaction. Node b may also reach node f through nodes c and e or through nodes a, d and e. These nodes may be type II nodes with aggressive behavior, adversely affecting the forwarding and completion of transactions in the tunnel. Therefore, it is necessary to analyze the steady state evolution of the channel network to improve the stability and security of the network. Analyzing the stability and safety of the channel faces the following problems:
(1) in a channel network, a central node does not exist generally, so that centralized control and supervision are difficult to realize;
(2) channel creation requires that transaction parties respectively deposit collateral articles with a certain amount of money to a multi-signature address, the amount of money is locked during transaction, and how to maximize the success rate of channel transaction is particularly important;
(3) due to the characteristics of the channel network, the network may be sparse, and there is little chance to complete transactions through direct connection, so the method of isolating the type II nodes alone is not suitable, and the type II nodes need to be fully utilized;
(4) and the nodes in the channel network are added and withdrawn, so that the topological structure of the channel network is changed continuously.
Disclosure of Invention
The invention provides a block chain lower channel network steady state evolution game method, which analyzes the channel network steady state evolution to improve the stability and the safety of a network.
In order to achieve the above object, a steady state evolution game method for a channel network under a block chain specifically includes the following steps:
s1, the two parties of the transaction initiate the transaction T and broadcast the transaction T to the channel network;
s2, carrying out strategy selection on the nodes in the channel network respectively, obtaining the initial strategy selection proportion of the nodes, and inputting the initial strategy selection proportion into the channel network to copy the dynamic model;
the nodes are divided into I-type nodes and II-type nodes, the I-type nodes comprise three strategies of cooperation, non-cooperation and defense, and the II-type nodes comprise three strategies of cooperation, attack and non-cooperation;
s3, carrying out an evolutionary game based on the network replication dynamic model, and outputting equilibrium points corresponding to the stable state of the evolutionary game, namely ESS points;
when C is presentD>CRWhen, the combination policy ((1,0,0), (1,0,0)) is an ESS of the channel network replication dynamic model; when C is presentD<CRWhen, the combination policy ((0,0,1), (1,0,0)) is an ESS of the channel network replication dynamic model;
wherein, CDRepresents the cost required for the type I node to adopt the defense strategy, CRRepresents the cost required by the node to make a transaction;
s4, the nodes in the channel network and the combined strategy reselection strategy corresponding to the equilibrium point, namely determining the strategy adopted by the nodes in the channel network for the transaction T;
the combination strategy ((1,0,0), (1,0,0)) represents that both type I and type II nodes will adopt a cooperative strategy to process the transaction T; the combination policy ((0,0,1), (1,0,0)) represents that type I nodes will adopt a defensive policy and type II nodes will adopt a cooperative policy to process transaction T.
Further, the network replication dynamic model comprises: the replication dynamic equation of the type I node and the replication dynamic equation of the type II node,
constructing a replication dynamic equation of the type I node based on the expected income of the type I node selection strategy and the product of the average income difference value of the type I node population and the strategy proportion;
constructing a replication dynamic equation of the type II node based on the expected income of the type II node selection strategy and the product of the average income difference value of the type II node population and the strategy proportion;
the expected yield of the type I node selection strategy I is:
Figure BDA0002372154060000041
the average benefit of the type I node population is as follows:
Figure BDA0002372154060000042
the replication dynamic equation for type I nodes is:
Figure BDA0002372154060000043
the expected yield of the type II node selection strategy j is:
Figure BDA0002372154060000044
the average benefit of the type II node population is as follows:
Figure BDA0002372154060000045
the replication dynamic equation for type II nodes is:
Figure BDA0002372154060000046
wherein, aijMatrix elements in the revenue matrix A being type I nodes, bijMatrix in revenue matrix B for type II nodesElement, xiRepresents the proportion of the type I node selection strategy I, yjRepresenting the proportion of type II node selection policy j.
Further, the revenue matrix A for type I nodes and the revenue matrix B for type II nodes are represented as follows:
Figure BDA0002372154060000047
Figure BDA0002372154060000051
wherein R represents the income obtained by the two parties in one game, CDRepresents the cost, R, required by the type I node to adopt the defense strategyARepresents the gain obtained by successful attack activity of the type II node, CARepresents the cost of a type II node for an attack activity, CRThe cost required by the node for one transaction is shown, L shows the loss of the I-type node when the I-type node is attacked, and P shows the success rate of attack success of an attack party under the condition that the I-type node adopts a defense strategy.
Further, the replication dynamic equation of the type I node includes: x is the number of1,x2,x3The replication dynamics equation for the type II node comprises: y is1,y2,y3Respectively, as follows:
Figure BDA0002372154060000052
Figure BDA0002372154060000053
Figure BDA0002372154060000054
Figure BDA0002372154060000055
Figure BDA0002372154060000056
Figure BDA0002372154060000057
Figure BDA0002372154060000058
representing the change rate of participant proportion with time when the class I node adopts a strategy I, I belongs to S1,S1∈{1,2,3},
Figure BDA0002372154060000059
Representing the change rate of participant proportion with time when the class II node adopts a strategy j, j belongs to S2,S2∈{1,2,3},x1,x2,x3Respectively representing the proportion of cooperation, non-cooperation and defense strategies adopted by the class I node; y is1,y2,y3Respectively representing the proportion of cooperative, aggressive and unworkable strategies adopted by class II nodes.
The channel network dynamic defense mechanism based on the evolutionary game adds a defense strategy on the strategy space of the type I node, considers the cost and success rate of attack of the type II node under the condition of deploying the defense strategy, and can help the type I node resist the attack behavior of the type II node with a certain probability. The nodes of the model have the finite evolutionary learning capacity, and can dynamically adjust respective strategies according to different attack strategies of attackers to achieve effective defense.
Drawings
Fig. 1 is a schematic structural diagram of a channel network arrangement according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a system C according to an embodiment of the present inventionD>CRWhen the I-type nodes do not adopt the defense strategy, the model stability analysis graph is obtained;
FIG. 3 is a block diagram of a system C according to an embodiment of the present inventionD>CRAnd the type I node is partially adoptedWhen a defense strategy is taken, a model stability analysis graph is obtained;
FIG. 4 is a graph illustrating the effect of initial scaling on model convergence, where (a) is strategy 3, (b) is strategy 4, and (c) is strategy 5;
FIG. 5 is a graph illustrating the effect of cost on model convergence provided by an embodiment of the present invention;
FIG. 6 is a diagram illustrating the effect of attack success rate on model convergence according to an embodiment of the present invention;
FIG. 7 shows a block diagram C according to an embodiment of the present inventionD<CRWhen the I-type nodes do not adopt the defense strategy, the model stability analysis graph is obtained;
FIG. 8 is CD<CRWhen the I-type node part adopts a defense strategy, the model stability analysis graph is obtained;
FIG. 9 is a graph illustrating the effect of initial scaling on model convergence, where (a) is strategy 3, (b) is strategy 6, and (c) is strategy 7;
FIG. 10 is a graph illustrating the effect of cost on model convergence provided by an embodiment of the present invention;
FIG. 11 is a diagram illustrating the effect of attack success rate on model convergence according to an embodiment of the present invention;
FIG. 12 is a diagram illustrating the impact of uncooperative behavior of nodes on transaction success rate provided by an embodiment of the present invention;
fig. 13 is a diagram illustrating an influence of an uncooperative behavior of nodes on a transaction transmission delay according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be given in order to provide those skilled in the art with a more complete, accurate and thorough understanding of the inventive concept and technical solutions of the present invention.
The method comprises the following steps of constructing a dynamic evolution game model based on a channel network, wherein three basic elements of game analysis need to be considered: participants, policy space, and revenue matrix.
The participants of the game are respectively composed of two different node sets: one is a node set composed of type I nodes, and benefits can be obtained by forwarding a transaction; the other is a set of nodes consisting of type II nodes that can gain revenue by launching an attack or forwarding a transaction.
For the type I node, three strategies of cooperation, non-cooperation and defense are available, and the strategy space of the type I node is recorded as:
S1∈{1,2,3} (1)
wherein, 1 represents that the type I node adopts a cooperation strategy, and the node adopting the cooperation strategy transmits the agreement to the transaction; 2, adopting a misaction strategy, and refusing to forward the transaction by adopting the misaction strategy; 3, adopting a defense strategy; the nodes adopting the defense strategy will defend against malicious uncooperative and offensive actions implemented by type II nodes.
For type II nodes, there are three strategies of cooperation, attack and non-cooperation, and the strategy space of type I nodes of type II nodes is recorded as:
S2∈{1,2,3} (2)
wherein, 1 represents that the II type node adopts a cooperation strategy, and the node adopting the cooperation strategy transmits the agreement to the transaction; 2, adopting an attack strategy, and implementing malicious uncooperative and attack behaviors on the type I node by the node adopting the attack strategy to obtain a profit; and 3 denotes taking the uncooperative strategy. Nodes adopting the non-operating strategy refuse to forward the transaction.
According to the characteristics of the channel network, the income parameters of the type I node and the type II node are defined as follows: r (reward): the income obtained by the two parties in one game can be the income obtained by the node successfully forwarding one transaction; cD(Cost of decay): the cost required by the type I node for adopting the defense strategy can be the consumption of funds; rA(Reward of attack): the gain obtained by the successful attack activity of the II type node can be the gain of funds, and the R is assumed>RA;CA(Cost of attack): the cost required by the type II node for attack activity can be the fund consumed in attack, the related legal sanctions when the type II node is found and the like; cR(Cost of relay): representing a node to do onceThe cost required for the transaction, which may be the consumption of funds; l (loss): representing the loss of type I nodes when under attack; p (Proavailability): the success rate of attack success of an attack party is shown under the condition that the I-type node adopts a defense strategy; in the yield parameters of both type I and type II nodes, R>CD>CA,R>CR>CA
The premise of the evolutionary game is that each participant in the game is rationalized in the decision phase, i.e., the participant makes a strategy selection in pursuit of maximum profit. The selfish or proficient nature of the game participants in a limited sense maximizes the benefits of the gaming pool. That is, if only selfish behavior or only interested behavior is not the optimal strategy for maximizing profit among a participant group or different participant groups, the maximization of group profit can be achieved only when selfish is achieved in some aspects and interested behavior is achieved in some aspects, that is, selfish behavior and interested behavior reach a certain proportion, which is also called the optimal strategy. The premise assumption of this patent is therefore that each node is required to make policy selections with the goal of maximizing the expected revenue given the respective policy space. Under the condition that the nodes of the two parties of the game do not know the strategies of each other, the income analysis of the two parties of the game is divided into the following three main conditions according to the II-type node strategy.
① when the type II node adopts cooperation strategy and the type I node adopts cooperation, non-cooperation and defense strategy, the game combination strategy between the type I node and the type II node includes three conditions of cooperation, non-cooperation, cooperation and defense and cooperation, the profit analysis of both game parties is shown in Table 4.1.
TABLE 4.1 revenue analysis of both parties in a game when a type II node takes a cooperation strategy
Figure BDA0002372154060000081
(collaboration ): the two parties agree to carry out the transaction, and the profits of the parties are the profits obtained by the game or the profits R of the transaction successfully forwarded by the node minus the cost C required by forwarding the transactionR. Therefore the type I node finally receivesIs benefit of R-CRThe final yield of the type II node is R-CR(ii) a (uncooperative, cooperative): the I-type nodes are not cooperated, the I-type nodes have no loss or gain, and the final gain is 0. The type II node can not successfully complete the forwarding operation because the type I node does not cooperate with the type I node to forward the transaction, so the successful benefit of forwarding is not obtained, and only the fund C consumed by one transaction is carried outR. The final yield of the type II node is recorded as-CR(ii) a (defense, collaboration): the type I node performs transaction due to the adoption of defense measures, and the two parties cooperate. The profits of all parties are profits obtained by the game or profits R successfully forwarded, and only the cost of the consumed funds is different. I-type node cost C consumed by deploying defensive measuresDAnd the final profit of the type I node is recorded as R-CD. Type II node consumes capital C for performing one transactionR. The final profit of the type II node is recorded as R-CR
When the type II node adopts a cooperation strategy and the type I node respectively adopts cooperation, non-cooperation and defense strategies, the type I node respectively obtains R-C R0 and R-CD(ii) a The type II node gains are R-CR、-CR、R-CR. Because it is assumed that R>CD>CA,R>CR>CASo that R-CR>0,R-CD>0, the maximum income of both parties is larger than 0, and the income maximization requirement is met.
② when the type II node takes the attack strategy, the profit analysis of the two parties to the game is shown in Table 4.2.
TABLE 4.2 revenue analysis of both parties in the game when the type II node takes the attack strategy
Figure BDA0002372154060000082
(collaboration, attack): the type I node cannot successfully complete the transaction forwarding operation because the selected cooperation strategy is successfully attacked by the type II node. The type I node has no successfully forwarded profit, only has the loss L when being attacked, and the final profit is-L. The II type node obtains the income R due to successful attackAFurthermore, a certain cost C is required for forwarding the transactionRThus the final benefit is RA-CR
(uncooperative, aggressive): the type I node cannot successfully complete the transaction forwarding operation because it is not collaborated and successfully attacked by the type II node. The type I node has no success forwarding profit, only has the loss L when being attacked, and the final profit is-L. Attack of type II nodes is not successful for uncooperative type I nodes, and yield R of attack success cannot be obtainedAAnd the attack activity requires a certain cost CAThus, the final yield of the type II node and the type I node is-CA
(defense, attack): the I type node adopts a defense strategy, so that the II type node only has P success rate attack success. Under the condition that the attack is successful, the I-type node obtains the profit R of successful forwarding, but the defense cost C is needed for deploying the defense measuresDAnd the I type node has loss L when the II type node is successfully attacked, the I type node has loss capital of P multiplied by L under the condition that the attack success rate is P, and therefore the final yield is R-CD-P × L. Attack of type II nodes is unsuccessful on type I nodes adopting defense strategies and can not obtain the successful gain R of attackAAnd the attack activity requires a certain cost CAThus the final yield of the type II node is-CA
When the type II node adopts an attack strategy and the type I node respectively adopts a cooperation strategy, a non-cooperation strategy and a defense strategy, the income of the type I node is respectively-L, -L and R-CD-P × L. According to the maximum income requirement, the defense strategy adopted by the type I node is effective, and the R-C is requiredD-PxL ≧ 0, i.e.:
R≥CD+P×L (3)
③ when the type II node adopts the strategy of no-operation, the profit analysis of the two parties in the game is shown in Table 4.3.
TABLE 4.3 revenue analysis of both parties in a game when a type II node takes a misbehaving policy
Figure BDA0002372154060000091
(cooperative, uncooperative): type I node is composed ofThe type II node does not cooperate with the type II node to forward and can not successfully complete the forwarding operation. Type I nodes do not forward successful proceeds, only the funds C consumed to make a transactionRThus, the final yield is-CR. The II type nodes are not cooperated, so that no loss or gain is generated, and the final gain of the II type nodes is 0; (uncooperative ): the two parties do not agree to carry out transaction forwarding, and the income of the two parties is 0; (defense, uncooperative): although the type I node adopts a defense strategy, the type II node does not cooperate, the type I node does not have the benefit of successful forwarding, and only the cost C required by deploying defense measuresDThus, the final yield is-CD. The type II nodes are not cooperative, so that no loss or no profit is caused, and the final profit of the type II nodes is 0.
When the II type node adopts the non-cooperative strategy and the I type node respectively adopts the cooperative, non-cooperative and defense strategies, the income of the I type node is-CR、0、-CD(ii) a Type II node earnings were 0,0 and 0. The maximum benefit of table 4.3 is 0.
As can be seen from tables 4.1 to 4.3, since there are three policy spaces for the type I node and the type II node, in order to balance the interest relationship between the type I node and the type II node, a 3 × 3 revenue matrix is respectively constructed for both game parties, and the revenue matrix of the type I node is denoted as a ═ aij]3×3The type II node profit matrix is denoted as B ═ Bij]3×3Where i is equal to {1,2,3}, j is equal to {1,2,3}, aijRepresenting the gain obtained by a type I node when the type I node adopting the I strategy plays games with a type II node adopting the j strategy, bijRepresenting the earnings obtained by the type II nodes when the type I node adopting the I policy is playing the game with the type II node adopting the j policy.
According to the game two-party income analysis table 4.1, table 4.2 and table 4.3, the income matrixes of the type I node and the type II node are respectively marked as A and B, and can be respectively obtained as follows:
Figure BDA0002372154060000101
Figure BDA0002372154060000102
in the channel network, a condition for keeping all nodes in a dynamic equilibrium state should be found; otherwise, if the network is unstable, the normal operation and safety of the network are affected. Therefore, the aim of creating the channel network dynamic evolution game model is to find conditions for keeping dynamic stability and balance.
An Evolution Stable Strategy (ESS) and a replication dynamic state are the most core concepts of the evolution game theory, wherein the ESS indicates a stable state of the evolution game, and the replication dynamic state indicates a convergence process for achieving the stable state. ESS is only a local stability strategy and does not constitute a sufficient condition for judging the stability of evolution in a random environment. In order to better describe the dynamic evolution process, the static concept and the dynamic process in the Evolutionary game theory are unified, and the static concept and the dynamic process in the Evolutionary game theory are unified by utilizing the concept of Evolutionary Equilibrium (Evolutionary Equilibrium). Replicating the dynamic equations may ensure that the ESS is balanced for evolution. The general form of the replication dynamic equation is as follows:
Figure BDA0002372154060000103
in the formula (6), PEFor the expected benefit of the strategy, PAIs the overall average gain in the policy space corresponding to the policy. z is a radical ofkThe proportion of the strategy k selected for the node is:
zk=Nk/M (7)
in the formula (7), NkAnd selecting the number of nodes of the strategy k in the strategy space, wherein M is the total number of the nodes in the strategy space. N is not less than 0k≤M。NkWhen 0, it means that there is no node selection policy k. N is a radical ofkWhen M, it means that all nodes select policy k.
The type I node and the type II node in the channel network respectively have respective strategy spaces. Note NiNumber of nodes for selecting policy I in policy space for type I node and I ∈ {1,2 ∈,3},
Figure BDA0002372154060000104
For the total number of nodes in the type I node policy space,
Figure BDA0002372154060000105
Figure BDA0002372154060000106
and is
Figure BDA0002372154060000107
The proportion of adopting cooperative, uncooperative and defensive strategies by the I-type node is x1,x2,x3
Figure BDA0002372154060000108
In the formula (8), it is known
Figure BDA0002372154060000109
Recording the proportion distribution set of the strategy of the I-type node at a certain moment as X:
X={xi|i∈{1,2,3}} (9)
note NjSelecting the number of nodes of the strategy j in the strategy space of the II type node and j is equal to {1,2,3},
Figure BDA0002372154060000111
for the total number of nodes in the type II node policy space,
Figure BDA0002372154060000112
and is
Figure BDA0002372154060000113
Noting that the proportion of adopting cooperative, attacking and uncooperative strategies by the II type nodes is y1,y2,y3:
Figure BDA0002372154060000114
In the formula (10), y is 0. ltoreq. yjLess than or equal to 1 and
Figure BDA0002372154060000115
recording that the proportion distribution set of the strategy of the II type node at a certain moment is Y:
Y={yj|j∈{1,2,3}} (11)
according to the replication dynamic theory of the evolutionary game, the replication dynamic equations of the type I node and the type II node can be obtained as follows: the expected yield of the type I node selection strategy I is given by equations (4), (9), (10):
Figure BDA0002372154060000116
aijfor the matrix elements of the type I node profit matrix a, the average profit of the type I node is obtained from equations (8), (9), (12):
Figure BDA0002372154060000117
the replication dynamic equation for type I nodes is:
Figure BDA0002372154060000118
the specific form of the replication dynamic equation obtained by substituting equations (12) and (13) into equation (14) is shown in equation (15):
Figure BDA0002372154060000119
(2) type II nodal replication dynamic equation
The expected yield of the type II node selection strategy j is given by equations (5), (8), (11):
Figure BDA00023721540600001110
bijbeing matrix elements of type II node revenue matrix B, type II nodeThe average profit of a point can be obtained from equations (10), (11), (16):
Figure BDA00023721540600001111
the replication dynamics equation for type II nodes is shown in equation (18):
Figure BDA0002372154060000121
by substituting formulae (16) and (17) for formula (18):
Figure BDA0002372154060000122
from the expressions (15) and (19), x is calculated1,x2,x3,y1,y2,y3Duplicate dynamic equations.
To be provided with
Figure BDA0002372154060000123
Representing the rate of change of participant proportion with time when the type I node adopts a strategy I, wherein I belongs to S1. X is calculated from the revenue matrix of equation (4) and equation (15)1,x2,x3The replication dynamic equation is:
Figure BDA0002372154060000124
Figure BDA0002372154060000125
Figure BDA0002372154060000126
to be provided with
Figure BDA0002372154060000127
Representing the rate of change of participant proportion with time when the type II node adopts a strategy j, wherein j belongs to S2. Y is calculated from the revenue matrix of equation (5) and equation (19)1,y2,y3The replication dynamic equation is:
Figure BDA0002372154060000128
Figure BDA0002372154060000129
Figure BDA00023721540600001210
replicating the dynamic equations ensures that an ESS with local dynamic stability exhibits a relationship and convergence process between the selection process of equilibrium and dynamics. But because the replication dynamics are non-linear, it is difficult to find a unique solution. Therefore, the evolutionary game shifts from solving the equilibrium to analyzing the stability of the equilibrium, which is important for prolonging the life cycle of the network.
According to the theory of the evolutionary game, the channel network replication dynamic systems of the type I nodes and the type II nodes are formed by the formulas (20) to (25), so that any point (X, Y) on the solution curves of the channel network replication dynamic systems of the type I nodes and the type II nodes corresponds to a mixed strategy ((X, Y) of the evolutionary game)1,x2,x3),(y1,y2,y3)). For the dynamically evolving game model, the possible equilibrium points can be calculated by equations (20) - (25) ((x)1,x2,x3),(y1,y2,y3) Values) are shown in table 5.1:
TABLE 5.1 dynamic evolutionary Game model equilibrium points
Figure BDA0002372154060000131
Is proved to be in CD>CRUnder the condition that the balance point ((1,0,0), (1,0,0)) is the only ESS, the point shows that all type I nodes and type II nodes are willing to select the cooperation strategy, such as theorem 1The flow of the graph is shown. Theorem 1: the only requirement of the ESS for which the equalization points ((1,0,0), (1,0,0)) are channel network replication dynamic system equations (20) - (25) is CD>CR
(1) Proof of Presence
The requirements for the ESS in which the points ((1,0,0), (1,0,0)) are channel system equations (20) to (25) are Trace J <0 and Det J >0[27 ]. Wherein the Matrix J is a Jacobian Matrix (Jacobian Matrix) of the evolutionary game, Trace J is defined as the sum of elements on the main diagonal of the Matrix J, and Det J is defined as the determinant of the Matrix J. Jacobian matrix notation
Figure BDA0002372154060000132
Equations (20) to (25) are substituted for equation (26), and a jacobian matrix corresponding to the channel system is obtained. Substituting the points ((1,0,0), (1,0,0)) into the system jacobian matrix J yields:
the traces of matrix J are: trace J ═ 5CR-CD-5R+RA
The determinant of the matrix J is: det J ═ CR-R)4(R-RA)(CD-CR),
∵R>RA
If CD>CR
∴Trace J=5CR-CD-5R+RA
<5CR-CR-5R+RA
=4CR-5R+RA
<4CR-5R+R
=4(CR-R)<0,
∵R>RA
If CD>CR
∴Det J>0,
Note that: when C is presentD=CRWhen Det J is 0, Det J in the ESS requirement is not satisfied>0, is required. Therefore CD≠CR
Therefore, when CD>CRAt this time, the point ((1,0,0), (1,0,0)) is an ESS of the channel network replication dynamic system.
(2) Proof of uniqueness
The possible equalization points calculated by equations (20) to (25) are shown in Table 5.1 for a total of 9. To prove the uniqueness of the dots ((1,0,0), (1,0,0)), the uniqueness of the dots ((1,0,0), (1,0,0)) can be explained by only proving that 8 dots other than the dots ((1,0,0), (1,0,0)) are not ESS according to the reverse thinking.
Is administered with BenD>CRWhen the temperature of the water is higher than the set temperature,
1) for points ((1,0,0), (0,1,0)), ((1,0,0), (0,0,1)), ((0,1,0), (1,0,0)), ((0,1,0), ((0,1,0)), ((0,1,0), (0,0,1)), ((0,0,1), (0,0,1)), Det J ═ 0, the requirements for ESS, i.e., Trace J <0 and Det J >0, are not met,
the above 6 equalization points are not ESS;
2) for the points ((0,0,1), (1,0,0)),
Trace J=3CD+2CR-CA-5R,
Det J=(CR-R)2(CR-R)2(R-CR+CA)(CR-CD) Wherein, in the step (A),
∵R>CR,CD>CR
∴R-CR+CA>0,CR-CD<0, then Det J<0, Trace J, which is a sufficient condition for not satisfying the ESS<0 and Det J>0,
Points ((0,0,1), (1,0,0)) are not ESS;
3) for the points ((0,0,1), (0,1,0)),
Trace J=3CD-CR+3CA-2L-2R+3P×L,
Det J=CA 2(CD–L–R+P×L)2(CD+P×L-R)(R-CR+CA) Wherein, in the step (A),
∵R≥CD+ P × L is shown in formula (3), and R>CR
∴CD+P×L–R<0,R-CR+CA>0, then Det J is less than or equal to 0, and does not satisfy the requirement of ESS, namely Trace J<0 and DetJ>0,
Points ((0,0,1,0,1,0)) are not ESS;
therefore, when CD>CRAt this time, the points ((1,0,0), (1,0,0)) are ESS unique to the channel network replication dynamic system.
The above proof of existence and uniqueness proves that the sufficient condition of the ESS with the point ((1,0,0), (1,0,0)) being the only of the channel network replication dynamic system equations (20) to (25) is CD>CR. To make CD>CRThis means that the cost of executing a transaction by a node is reduced or the cost of deploying a defense strategy by a type I node is increased, so that the cost of executing a transaction is greater than the cost of deploying a defense strategy by a type I node. Therefore, the I-type node can reasonably select whether to deploy the defense strategy or not according to the defense cost of different defense strategies, thereby effectively reducing the overhead and prolonging the life cycle of the node in the whole channel network.
Is proved to be in CD<CRUnder the conditions, the equalization point ((0,0,1), (1,0,0)) is the only ESS. This point indicates that all type I nodes are willing to choose a defense strategy and all type II nodes are willing to choose a cooperation strategy, as shown in theorem 2.
Theorem 2: ((0,0,1), (1,0,0)) is C is the only ESS of the channel network replication dynamic systemD<CRAfter the evolution game is finished, all the type I nodes select a defense strategy, and all the type II nodes select a cooperation strategy.
(1) Proof of Presence
The points ((0,0,1), (1,0,0)) are the sufficiency conditions for the channel system ESS, Trace J <0 and Det J > 0. The Jacobian matrix corresponding to the channel system can be obtained by substituting equations (20) to (25) for equation (26). Substituting the points ((0,0,1), (1,0,0)) into the system jacobian matrix J yields:
the traces of matrix J are: trace J ═ 3CD+2CR-CA-5R,
The determinant of the matrix J is: det J ═ CD-R)2(CR-R)2(CR-CD)(R-CR+CA),
∵R>RA,R>CR
If CD<CR
∴Trace J=3CD+2CR-CA-5R
<3CR+2CR-CA-5R
=5CR-5R-CA
=5(CR-R)-CA
<0,
Has another radical (R)>CR,CA>0,∴R-CR+CA>0,Det J>0,
Note that: when C is presentD=CRWhen Det J is 0, Det J in the ESS requirement is not satisfied>0, is required. Therefore CD≠CR
Therefore, when CD<CRAt this time, the point ((0,0,1), (1,0,0)) is an ESS of the channel network replication dynamic system.
(2) Proof of uniqueness
The possible equalization points calculated by equations (20) to (25) are shown in Table 5.1 for a total of 9. To prove the uniqueness of the dots ((0,0,1), (1,0,0)), the uniqueness of the dots ((0,0,1), (1,0,0)) can be explained by only proving that 8 dots other than the dots ((0,0,1), (1,0,0)) are not ESS according to the reverse thinking.
Is administered with BenD<CRWhen the temperature of the water is higher than the set temperature,
1) for points ((1,0,0), (0,1,0)), ((1,0,0), (0,0,1)), ((0,1,0), (1,0,0)), ((0,1,0), (0,1,0)), ((0,1,0), (0,0,1)), ((0,0,1), (0,0,1)), Det J ═ 0, the requirements for ESS, i.e., Trace J <0 and Det J >0, are not met,
the above 6 equalization points are not ESS;
2) for the points ((1,0,0), (1,0,0)),
Trace J=5CR-CD-5R+RA
Det J=(CR-R)4(R-RA)(CD-CR) Wherein, in the step (A),
∵R>CA,CD>CR
det J <0, which does not satisfy the requirements of ESS, i.e., Trace J <0 and Det J >0,
points ((1,0,0), (1,0,0)) are not ESS;
3) for the points ((0,0,1), (0,1,0)),
Trace J=3CD-CR+3CA-2L-2R+3P×L,
Det J=CA 2(CD–L–R+P×L)2(CD+P×L-R)(R-CR+CA) Wherein, in the step (A),
∵R≥CD+ P × L is shown in formula (3), and R>CR
∴CD+P×L–R<0,R-CR+CA>0, then Det J is less than or equal to 0, and does not satisfy the requirement of ESS, namely Trace J<0 and DetJ>0,
Points ((0,0,1), (0,1,0)) are not ESS;
therefore, when CD<CRAt this time, the points ((0,0,1), (1,0,0)) are ESS unique to the channel network replication dynamic system.
The above proof of existence and uniqueness proves that the sufficient condition of the ESS that the point ((0,0,1), (1,0,0)) is the only one of the channel network replication dynamic system equations (20) to (25) is CD<CR. To make CD<CRThis means that the cost of a node to perform a transaction is increased or the cost of a type I node to deploy a defense strategy is decreased such that the cost of performing a forward transaction is less than the cost of a type I node to deploy a defense strategy. Therefore, the I-type node can reasonably select and deploy different defense strategies according to the defense costs of the different defense strategies, so that the overhead is effectively reduced, and the life cycle of the node in the channel network is longer.
According to theorem 1 and theorem 2, when the cost required by deploying the defense strategy by the type I node is larger than the cost required by the node to perform one-time forwarding transaction, all the type I nodes in the channel network adopt the cooperation strategy and all the type II nodes adopt the cooperation strategy after the evolution game is finished. However, when the cost required by the type I node to deploy the defense strategy is less than the cost required by the node to perform one-time forwarding transaction, after the evolutionary game is finished, all the type I nodes in the channel network adopt the defense strategy and all the type II nodes adopt the cooperation strategy.
In the current channel transaction process of the block chain, the nodes of both parties of the transaction need to cooperate, if one party of the nodes does not want to cooperate, the channel is closed, the nodes of both parties need to be switched to the block chain to realize transaction operation, and long time is spent for completing transaction verification. Therefore, when a transaction is performed in the channel network, the steady state of the channel network needs to be ensured to ensure that the transaction is completed smoothly. The method is characterized in that node transaction in a channel network is modeled into a dynamic evolution game model based on a replication dynamic mechanism with limited rationality and a biological evolution process, the dynamic evolution game model designs a channel network dynamic defense mechanism based on an evolution game, a defense strategy is added to a strategy space of a type I node by the mechanism, the cost and success rate of attack of a type II node under the condition of deploying the defense strategy are considered, and the defense mechanism can help the type I node to resist the attack behavior of the type II node with a certain probability. The nodes of the model have the finite evolutionary learning capacity, and can dynamically adjust respective strategies according to different attack strategies of attackers to achieve effective defense.
Because of the randomness of the uncooperative behavior of the nodes in the real scene, in order to verify the performance advantage of the applied channel network in the real scene, a simulation framework is developed to simulate a lightning network and a dynamic evolution game channel network with an attack and defense strategy, and the result shows that the channel network with a dynamic defense mechanism has a better transaction transmission success rate and a lower time delay, and the simulation process is specifically as follows:
(1) the experimental environment is as follows: 1) computer configuration: the Windows8 sixty-four-bit operating system comprises an Intel Core i5 processor, a CPU2.80GHz and an 8G memory; 2) and (3) environment configuration: and (4) adopting an MTLAB2018b tool to simulate the game process and result of the dynamic evolution game model.
(2) Experimental parameters: because the measurement standards of parameters such as node transaction income, cost and the like are different, all research parameters are subjected to standardization processing, and the values are within [0,1 ]. The specific experimental parameter design is shown in table 6.1:
TABLE 6.1 Experimental parameters Table
Figure BDA0002372154060000171
In Table 6.1, to test the effect of different defense costs on the speed of the system to ESS, when CD>CRWhen R is more than or equal to C according to formula (3)D+P×L,CDValues of 0.42, 0.44 and 0.46 respectively to test the effect of different defense costs on the system's speed to ESS, otherwise CDThe value is 0.46. When C is presentD<CRWhen R is more than or equal to C according to formula (3)D+P×L,CDThe values are respectively 0.1, 0.2 and 0.3 to test the influence of different defense costs on the speed of the system to reach the ESS, and C is used in other casesDThe value is 0.3; in addition, R, R in Table 6.1A、CR、CAIs taken to satisfy R>RA,R>CD>CA,R>CR>CAThe requirements of (1).
The nodes in the evolutionary game are limited, the loss after the attack is the same as the loss after the successful game is carried out and the transaction income is completed, and therefore L is 1; in order to test the influence of different attack success rates of II-type nodes on the speed of the system reaching the ESS, the requirement that R is more than or equal to C in the formula (3)DUnder the condition of + P multiplied by L, the values are respectively 0.1, 0.2 and 0.4, and the values are 0.5 in other cases.
(3) Description of other parameters
1) Simulation time (Time (s))
And (4) the simulation time required by the evolutionary game to reach the evolutionary equilibrium, namely the time required by the channel network replication dynamic system to converge to the ESS point.
2) Proportion of strategy selected by Node (Node ratio (%))
On the solution curve of the I-type node and II-type node channel network replication dynamic system, the simulation point (X, Y) corresponds to a combination strategy of the evolutionary game ((X)1,x2,x3),(y1,y2,y3) I.e. the proportional distribution of the strategies adopted by the type I and type II nodes. See equations (8) and (10) for the calculation. In the initial state of the evolution game, according to 7 different combination strategies in the table 6.2, the type I node and the type II node select respective strategies to carry out a game experiment. The settings of the specific combination strategy are shown in table 6.2:
TABLE 6.2 proportion parameter Table for node selected policy
Figure BDA0002372154060000181
Figure BDA0002372154060000191
(4) Performance analysis index
1) Stability: the stability of the balance between the type I node and the type II node depends on the comparison of the profit values of the strategy selection of the type I node and the type II node in the evolutionary game, and the individuals in the two parties in the population can still change continuously when the ESS is reached, namely the process that the interior of the two parties changes continuously and the population is not changed.
2) Convergence property: whether the system can reach the ESS and the amount of time required to reach the ESS are indicated by time(s). I.e., the shorter the required time, the better the convergence.
Under the dynamic replication, the achievement of the ESS is evolution equilibrium, and the nodes and channels in the channel network are still constantly changing when the evolution equilibrium is achieved. In order to research the influence process and the influence result of the continuous change in the channel network on the whole channel network, a simulation model is established according to the formulas (20) to (25). According to different experimental purposes, a combination strategy (X, Y) ((X)1,x2,x3),(y1,y2,y3) X) is an initial value of1,x2,x3,y1,y2,y3The game process is reflected on the simulation image as x1,x2,x3,y1,y2,y3Proportion of policies selected by respective corresponding nodesNode ratio (%), i.e. the image ordinate. And observing the game process according to the change of the strategy proportion, and analyzing the stability of the channel network dynamic evolution game model. When C is presentD>CRThe result of the game of the dynamically evolving model of the model is a (cooperation ) combination strategy.
The analysis of the system evolution stability whether a defense strategy is adopted or not in the initial state of the I-type node is specifically as follows:
(1) DCtake 0.46. When strategy 1 is selected for evolutionary game, the channel network game process is shown in figure 2, and figure 2 is DC> RCWhen the I-type nodes do not adopt the defense strategy, the model evolves a stable state analysis graph; as can be seen from fig. 2, when no defense strategy is adopted for the type I node in the channel network, the type II node selects an attack strategy to maximize its own benefit, the type I node always selects a cooperation strategy, and after several games, the type II node also selects a cooperation strategy to reduce its own loss through evolutionary learning, and the network finally converges to a stable state where both parties cooperate.
(2)CDTake 0.46. When the strategy 2 is selected for the evolution game, the channel network game process is shown in figure 3, and figure 3 is CD>CRAnd when the I-type node part adopts the defense strategy, the system evolves the analysis chart of the stable state, as can be known from fig. 3, when some I-type nodes in the channel network take the defense measure, the I-type nodes adopt the defense strategy, and the II-type nodes are subjected to evolution learning for a period of time, observe that the I-type nodes adopt the defense strategy, and select the cooperation strategy for maximizing the benefits of the nodes. After the I-type node evolves and learns for a period of time, after the II-type node adopts a cooperation strategy, the defense strategy is abandoned to be changed into a cooperation strategy for the maximization of the benefit of the node, and the network finally converges to a stable state where both the nodes cooperate. Is described in CD>CRAnd meanwhile, whether the I-type node takes defense measures or not has no influence on the game evolution strategy of the network replication dynamic system.
The influence of the initial ratio on the convergence of the system is specifically explored as follows:
for studying type I and type II nodes, respectivelyThe influence of the initial proportion of the deployed cooperation strategy on the convergence of the system is known from the stability analysis of the dynamic system of channel network replication in the theoretical 1 and 6.2.1 sections, and the combined strategy (cooperation) is the ESS of the system. On the basis, whether the two game parties can still maintain a stable state and influence on model convergence is further considered for different initial proportions of the channel network node selection cooperation strategy. CDTaking 0.46, fig. 4(a) is a graph of the influence of the initial proportion on the system convergence when the strategy 3 is adopted, fig. 4(b) is a graph of the influence of the initial proportion on the system convergence when the strategy 4 is adopted, fig. 4(c) is a graph of the influence of the initial proportion on the system convergence when the strategy 5 is adopted, and as can be seen from fig. 4(a) and fig. 4(b), the higher the initial proportion of the type I node adopting the cooperation strategy is, the faster the model convergence is; as can be seen from fig. 4(b) and 4(c), the higher the initial proportion of the type II nodes that adopt the cooperation strategy, the faster the convergence of the model.
The influence of cost on the convergence of the system is specifically explored as follows:
in order to research the influence of the cost of the type I node deployment defense strategy on the system convergence, the cost C of the type I node deployment defense strategy is changed according to the ESS stability analysisDThe values of the parameters were subjected to simulation analysis. When C is presentD>CRIn order to simplify the simulation graph, only the evolution process that the type I node adopts the cooperation strategy and the type II node adopts the cooperation strategy is displayed in the simulation graph. When strategies 2 and C are adopted in the evolutionary game processD>CRThe cost of the type I node deployment defense strategy of 1/3 is 0.42, 0.44 and 0.46 respectively, the effect of the cost on the system reaching ESS speed is shown in FIG. 5, and it can be seen from FIG. 5 that when C isD>CRIn time, under the condition of three different defense cost games, the cost of deploying the defense strategy by the nodes has obvious influence on the system convergence. As the defense cost increases, the speed at which the type I node reaches the stable cooperation state increases, the speed at which the type II node reaches the stable cooperation state does not change, and the speed at which the system as a whole reaches the ESS increases, that is, the system convergence improves. In the game process, part of I-type nodes adopt a defense strategy, and II-type nodes observeAdopting a defense strategy to the I-type node, and adopting a cooperation strategy for maximizing the benefit of the node; and at the moment, the type I node observes that the type II node adopts a cooperation strategy, and in order to maximize the benefit of the type I node, the defense strategy is abandoned and the cooperation strategy is adopted. Through the evolutionary game, the system will eventually converge to a stable state of the ESS. In this state, the type I node and the type II node both adopt a cooperation strategy and can obtain maximized benefits, and no matter one node or a plurality of nodes have no motivation to deviate from the maximized benefits. Therefore, the higher the cost of deploying the defense strategy by the type I node, the faster the system can reach the ESS, i.e., the better the system convergence.
The influence of the attack success rate on the system convergence is specifically explored as follows:
in order to study the influence of different attack success rates of II-type nodes on system convergence, simulation analysis is performed by changing the value of the attack success rate P parameter of the II-type nodes according to ESS stability analysis. CDTake 0.46. When strategies 2 and C are adopted in the evolutionary game processD>CRWhen the success rates of type II node attacks of 1/3 are 0.1, 0.2, and 0.4, respectively, the influence of the attack success rate on the system convergence is shown in fig. 6, and it is clear from fig. 6 that C is the success rate of the attackD>CRIn time, under the condition of three different attack success rate games, the attack success rate of the type II node has influence on the system convergence. With the increase of the success rate of the attack, the speed of the type I node reaching the stable cooperation state is increased, the speed of the type II node reaching the stable cooperation state is unchanged, and the speed of the whole system reaching the ESS is increased, namely the convergence of the system is improved. The gaming process is analyzed in section 6.2.3, and finally, the type I node gives up the defense strategy to adopt the cooperation strategy in order to maximize the interest of the type I node. In case the defense cost is larger than the transaction cost, the higher the attack success rate, the faster the system reaches the ESS, i.e. the better the system convergence.
Based on the replication dynamic system modeled by the equations (20) to (25), a mixing strategy (X, Y) ((X) is given according to different experimental purposes1,x2,x3),(y1,y2,y3) X) is an initial value of1,x2,x3,y1,y2,y3Substituting and copying the dynamic system expression, wherein the game process is reflected on the simulation image as x1,x2,x3,y1,y2,y3The ratio Node ratio (%) of the policy selected by the respective corresponding Node, i.e., the image ordinate. And observing the game process according to the change of the strategy proportion, and analyzing the stability of the channel network dynamic evolution game model. When C is presentD<CRMeanwhile, the game result of the dynamic evolution model of the system is a combined strategy (defense and cooperation).
System evolution stability analysis for judging whether defense strategy is adopted or not in initial state of I-type node
(1)CDTake 0.3. When strategy 1 is selected for the evolutionary game, the channel network game process is shown in FIG. 7, and FIG. 7 is CD<CRAnd when the I-type nodes do not adopt the defense strategy, the model evolves to a steady state analysis diagram, as can be seen from fig. 7, when the I-type nodes in the channel network do not adopt the defense strategy, the II-type nodes select the attack strategy in order to maximize their own benefits, and after a period of game, the I-type nodes always select the cooperation strategy, and the II-type nodes further select the cooperation strategy through evolution learning to reduce their own loss, and the network finally converges to the state where both parties cooperate.
(2)CDTake 0.3. When the strategy 2 is selected for the evolution game, the channel network game process is shown in figure 8, and figure 8 is CD<CRAnd when the I-type node part adopts the defense strategy, the model evolves the steady state analysis graph, as can be seen from fig. 8, when some I-type nodes in the channel network take the defense measure, the II-type nodes evolve and learn for a period of time, and observe that the I-type nodes adopt the defense strategy, the cooperation strategy is selected for maximizing the benefit of the I-type nodes, and the network finally converges to the (defense, cooperation) stable combination strategy. Is described in CD<CRAnd meanwhile, whether the I-type node takes defense measures or not has influence on the game evolution strategy of the network replication dynamic system. In combination with the above analysis, whether it is CD>CROr is CD<CRAll can be obtained as followsAnd (4) conclusion: whether the I-type node takes defense measures or not has influence on the game evolution strategy of the network replication dynamic system.
The influence of the initial proportion of the strategy on the convergence of the system is specifically explored as follows:
in order to research the influence of the initial proportion of the defense strategy and the cooperation strategy respectively deployed by the type I node and the type II node on the convergence of the system, the stability analysis of a theory 2 and a node channel network replication dynamic system is used for obtaining that the combination strategy (defense and cooperation) is an ESS of a model. On the basis, whether the two game parties can still maintain a stable state and influence on the model to reach the ESS speed is further considered for different initial proportions of the channel network type I node selection defense strategy and the type II node selection cooperation strategy. CDTake 0.3. FIG. 9(a) is the effect of initial scale on model convergence when strategy 3 is used, FIG. 9(b) is the effect of initial scale on model convergence when strategy 6 is used, FIG. 9(c) is the effect of initial scale on model convergence when strategy 7 is used, and it can be seen from FIGS. 9(a) and 9(b) that system convergence is faster as the initial scale of the defense strategy is taken by the type I node is higher; as can be seen from fig. 9(b) and 9(c), the higher the initial proportion of the type II nodes that adopt the cooperation strategy, the faster the system converges. Based on the above analysis, it was found that either C or C is presentD>CROr is CD<CRThe following conclusions can be drawn: the convergence of the model is influenced by the initial proportion of the two game parties, and the higher the initial proportion is, the better the convergence of the model is.
The influence of cost on the convergence of the system is specifically explored as follows:
in order to research the influence of the cost of the type I node deployment defense strategy on the system convergence, the C forming of the type I node deployment defense strategy is changed according to the ESS stability analysisDThe values of the parameters are used for simulation analysis. When C is presentD<CRIn order to simplify the simulation graph, only the evolution process that the type I node adopts the defense strategy and the type II node adopts the cooperation strategy is displayed in the simulation graph. When strategies 2 and C are adopted in the evolutionary game processD<C R1/3 type I node deployment defense strategy cost scoreThe influence of cost on the system convergence is shown in fig. 10 for 0.1, 0.2, and 0.3, respectively, and it can be seen from fig. 10 that C is the valueD<CRIn time, under three different defense cost game conditions, the cost of deploying the defense strategy by the nodes has an influence on the system convergence. With the increase of the defense cost, the speed of the type I node reaching the stable defense state is slightly reduced, the speed of the type II node reaching the stable cooperation state is reduced, and the speed of the system as a whole reaching the ESS is reduced, that is, the system convergence is reduced. Through the evolutionary game, the system converges to a stable state of the ESS. In this state, both type I nodes adopt a defense strategy, both type II nodes adopt a cooperation strategy, and both nodes can obtain maximized benefits, regardless of whether one or more nodes have no motivation to deviate from the maximized benefits. Therefore, the lower the cost of the type I node deployment strategy, the faster the system can reach the ESS, i.e., the better the system convergence.
Based on the above analysis, it was found that either C or C is presentD>CROr is CD<CRThe following conclusions can be drawn: under the condition of different defense cost games, the cost of deploying defense strategies by the type I nodes has influence on the convergence of the system.
The influence of the attack success rate on the system convergence is specifically explored as follows:
in order to study the influence of different attack success rates of II-type nodes on system convergence, simulation analysis is performed by changing the value of the attack success rate P parameter of the II-type nodes according to ESS stability analysis. CDTake 0.3. When strategies 2 and C are adopted in the evolutionary game processD<CRWhen the success rates of type II node attacks of 1/3 are 0.1, 0.2, and 0.4, respectively, the effect of the attack success rate on the speed of the system to the ESS is shown in fig. 11, and it can be seen from fig. 11 that when C isD<CRIn time, under the condition of three different attack success rate games, the attack success rate of the type II node has influence on the system convergence. With the increase of the success rate of the attack, the speed of the type I node reaching the stable cooperation state is reduced, the speed of the type II node reaching the stable cooperation state is unchanged, and the speed of the system reaching the ESS as a whole is reduced, that is, the convergence of the system is reduced. In case the defense cost is less than the transaction costIn this case, the lower the attack success rate, the faster the system reaches the ESS, i.e., the better the system convergence.
Based on the above analysis, it was found that either C or C is presentD>CROr is CD<CRThe following conclusions can be drawn: under the game condition of three different attack success rates of the type II nodes, the attack success rate of the type II nodes has influence on the system convergence.
From theorem 1, when C isD>CRThe equalization point ((1,0,0), (1,0,0)) is an ESS of the channel network replication dynamic system. From theorem 2, when C isD<CRThe equalization point ((0,0,1), (1,0,0)) is an ESS of the channel network replication dynamic system. Based on these two ESS under different conditions, the stability and convergence analysis of the channel network is performed, and the conclusion is as follows:
1) and (3) stability analysis: after the channel network passes through an evolutionary game, the II type node with the attack behavior gives up the attack and adopts a cooperation strategy; and the type I node adopts a cooperation strategy (when C isD>CRWhen) or defense strategies (when CD<CRIn time), the channel network has better stability and convergence, and the network performance is improved. 2) Influence of initial ratio on system convergence: the initial proportion of each strategy (cooperation strategy or defense strategy) adopted by the node has an influence on the system convergence, i.e. the higher the initial proportion is, the better the system convergence is. 3) Cost impact on system convergence: when the cost required by deploying the defense strategy by the type I node is greater than the cost required by the node for carrying out one-time forwarding transaction, the higher the cost of adopting the defense strategy by the node is, the better the system convergence is; when the cost required by deploying the defense strategy by the type I node is less than the cost required by the node for carrying out one-time forwarding transaction, the lower the cost for adopting the defense strategy by the node is, the better the system convergence is. 4) Impact of attack success rate on system convergence: when the cost required by deploying the defense strategy by the I-type node is more than the cost required by carrying out one-time forwarding transaction by the node, the higher the attack success rate is, the higher the system convergence is; when the cost required by the I-type node for deploying the defense strategy is less than the cost required by the node for carrying out one-time forwarding transaction, the lower the attack success rate isThe better the system convergence.
Due to the randomness of the uncooperative behavior of the nodes in the real scene, the performance advantage of the channel network of the patent in the real scene, particularly in the case of the uncooperative behavior of the nodes, needs to be further verified. To this end, a simulation framework was developed to simulate Lightning networks and evolving game channel networks with defense strategies. The specific network configuration is as follows:
(1) network topology: generating a random undirected topological graph consisting of 1000 nodes; wherein, 100 II type nodes are randomly extracted from 1000 nodes, and the whole simulation time is 40000 seconds;
(2) routing protocol: the routing protocol mainly comprises 2 types: based on the maximum flow algorithm and based on the Landmark algorithm. Based on a maximum flow algorithm, requiring nodes to store a channel map of the whole network, and finding a feasible payment path of a target point by using a classic maximum flow algorithm, such as Push-Relay and the like; the Landmark-based algorithm mainly comprises a Flare scheme, a Landmark Routing scheme and the like. In the current 2-class schemes, the storage overhead and the running cost based on the maximum flow scheme are too high, and in the scheme based on the Landmark, although the node is not required to store the whole network graph, the success rate of the path searching depends on the mode and the size of the selected beacon point set, and whether the searched path is the optimal path or not cannot be ensured, and more importantly, a solution for bearing malicious behaviors is not provided. For each transaction request, a Flooding (Flooding) mechanism is adopted by using an Epidemic routing protocol, and the message is transmitted to the neighbor nodes as long as the opportunity exists, namely all the nodes transmit the message to all the neighbor nodes. The buffer area of the nodes in the model is set to be large enough, the Epidemic routing protocol can ensure the fairness of the node routing information in the dynamic evolution game model of the channel network, the probability of each node being selected is high, the influence of the nodes with low utilization rate on the network performance is reduced, and the experimental analysis is as follows.
(1) Transaction success rate (abbreviated as T)R)
The transaction average transmission success rate is the number of transaction messages successfully sent to the target node and the total number of transaction messages: t isR=RM/TMWherein R isMNumber of transaction messages successfully sent to target node, TMIs the total transaction message quantity.
Fig. 12 shows the influence of the uncooperative behavior of the node on the transaction success rate, and fig. 12 reflects the influence of the uncooperative behavior of the node on the transaction average transmission rate under different channel network configurations when the policy 2 and the attack success rate P are 0.5. In Lightning networks, the uncooperative behavior causes the trade mean transmission success rate to decrease due to the presence of type II nodes in the network and the lack of security measures in the network. For the evolutionary game channel network with a defense strategy, the I-type node can resist different attack behaviors at a certain probability, so that the network reaches a stable cooperation state, and the average transaction transmission rate in the network is increased.
(2) Average message transmission delay (abbreviated as T)D)
TDThe average time from the generation of the transaction request message for the root node (transaction requester) to the reception of the message by the target node, i.e. the difference between the transaction completion time and the transaction initiation time: t isD=TC-TSWherein, TCFor transaction completion time, TSIs the transaction start time. Fig. 13 shows the influence of the uncooperative behavior of the node on the average message transmission delay, and fig. 13 reflects the influence of the uncooperative behavior of the node on the average transaction transmission delay under different channel network configurations when the policy 2 and the attack success rate P are 0.5. In the channel network, transactions including type II nodes always exist, and in this case, the transaction routing will cause longer transaction delay; for the evolutionary game channel network with the defense strategy, the network can reach a stable cooperation state through a defense mechanism and an evolutionary game process, and therefore the influence of uncooperative nodes on transaction time delay is relieved.
The invention has been described above with reference to the accompanying drawings, it is obvious that the invention is not limited to the specific implementation in the above-described manner, and it is within the scope of the invention to apply the inventive concept and solution to other applications without substantial modification.

Claims (4)

1. A steady state evolution game method of a channel network under a block chain is characterized by comprising the following steps:
s1, the two parties of the transaction initiate the transaction T and broadcast the transaction T to the channel network;
s2, carrying out strategy selection on the nodes in the channel network respectively, obtaining the initial strategy selection proportion of the nodes, and inputting the initial strategy selection proportion into the channel network to copy the dynamic model;
the nodes are divided into I-type nodes and II-type nodes, the I-type nodes comprise three strategies of cooperation, non-cooperation and defense, and the II-type nodes comprise three strategies of cooperation, attack and non-cooperation;
s3, carrying out an evolutionary game based on the network replication dynamic model, and outputting a balance point corresponding to the stable state of the evolutionary game, namely an ESS;
when C is presentD>CRWhen, the combination policy ((1,0,0), (1,0,0)) is an ESS of the channel network replication dynamic model; when C is presentD<CRWhen, the combination policy ((0,0,1), (1,0,0)) is an ESS of the channel network replication dynamic model;
wherein, CDRepresents the cost required for the type I node to adopt the defense strategy, CRRepresents the cost required by the node to make a transaction;
s4, the nodes in the channel network reselect the strategy according to the combination strategy corresponding to the equilibrium point, namely the strategy adopted by the nodes in the channel network for the transaction T is determined;
the combination strategy ((1,0,0), (1,0,0)) represents that both type I and type II nodes will adopt a cooperative strategy to process the transaction T; the combination policy ((0,0,1), (1,0,0)) represents that type I nodes will adopt a defensive policy and type II nodes will adopt a cooperative policy to process transaction T.
2. The method for steady-state evolutionary gaming of a block-link down channel network as claimed in claim 1, wherein the network replication dynamic model comprises: the replication dynamic equation of the type I node and the replication dynamic equation of the type II node,
constructing a replication dynamic equation of the type I node based on the expected income of the type I node selection strategy and the product of the average income difference value of the type I node population and the strategy proportion;
constructing a replication dynamic equation of the type II node based on the expected income of the type II node selection strategy and the product of the average income difference value of the type II node population and the strategy proportion;
the expected yield of the type I node selection strategy I is:
Figure FDA0002372154050000011
the average benefit of the type I node population is as follows:
Figure FDA0002372154050000012
the replication dynamic equation for type I nodes is:
Figure FDA0002372154050000013
the expected yield of the type II node selection strategy j is:
Figure FDA0002372154050000014
the average benefit of the type II node population is as follows:
Figure FDA0002372154050000021
the replication dynamic equation for type II nodes is:
Figure FDA0002372154050000022
wherein, aijMatrix elements in the revenue matrix A being type I nodes, bijMatrix elements, x, in the revenue matrix B for type II nodesiRepresents the proportion of the type I node selection strategy I, yjRepresenting the proportion of type II node selection policy j.
3. The method for game playing under stable evolution of the channel network under the block link as claimed in claim 2, wherein the revenue matrix a of the type I node and the revenue matrix B of the type II node are expressed as follows:
Figure FDA0002372154050000023
Figure FDA0002372154050000024
wherein R represents the income obtained by the two parties in one game, CDRepresents the cost, R, required by the type I node to adopt the defense strategyARepresents the gain obtained by successful attack activity of the type II node, CARepresents the cost of a type II node for an attack activity, CRThe cost required by the node for one transaction is shown, L shows the loss of the I-type node when the I-type node is attacked, and P shows the success rate of attack success of an attack party under the condition that the I-type node adopts a defense strategy.
4. The method for steady-state evolution gaming of the channel network under the blockchain as claimed in claim 2, wherein the replication dynamic equation of the type I node comprises: x is the number of1,x2,x3The replication dynamics equation for the type II node comprises: y is1,y2,y3Respectively, as follows:
Figure FDA0002372154050000025
Figure FDA0002372154050000026
Figure FDA0002372154050000027
Figure FDA0002372154050000028
Figure FDA0002372154050000029
Figure FDA0002372154050000031
Figure FDA0002372154050000032
representing the rate of change of participant proportion with time when the type I node adopts a strategy I, I belongs to S1,S1∈{1,2,3},
Figure FDA0002372154050000033
Representing the change rate of participant proportion with time when the II type node adopts a strategy j, j belongs to S2,S2∈{1,2,3},x1,x2,x3Respectively representing the proportion of cooperation, non-cooperation and defense strategies adopted by the type I node; y is1,y2,y3Respectively representing the proportion of cooperation, attack and non-operation strategies adopted by the class II nodes;
r represents the profit obtained by the two parties in a game, CDRepresents the cost, R, required by the type I node to adopt the defense strategyARepresents the gain obtained by successful attack activity of the type II node, CARepresents the cost of a type II node for an attack activity, CRThe cost required by the node for one transaction is shown, L shows the loss of the I-type node when the I-type node is attacked, and P shows the success rate of attack success of an attack party under the condition that the I-type node adopts a defense strategy.
CN202010053929.6A 2020-01-17 2020-01-17 Channel network steady state evolution game method in block link environment Active CN111245857B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010053929.6A CN111245857B (en) 2020-01-17 2020-01-17 Channel network steady state evolution game method in block link environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010053929.6A CN111245857B (en) 2020-01-17 2020-01-17 Channel network steady state evolution game method in block link environment

Publications (2)

Publication Number Publication Date
CN111245857A true CN111245857A (en) 2020-06-05
CN111245857B CN111245857B (en) 2021-11-26

Family

ID=70879571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010053929.6A Active CN111245857B (en) 2020-01-17 2020-01-17 Channel network steady state evolution game method in block link environment

Country Status (1)

Country Link
CN (1) CN111245857B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988286A (en) * 2020-08-03 2020-11-24 浙江工商大学 DDoS attack analysis and decision method for bitcoin mine pool based on evolutionary game
CN112287398A (en) * 2020-12-29 2021-01-29 江苏荣泽信息科技股份有限公司 Block chain network node switching system based on safe storage hardware
CN112330019A (en) * 2020-11-04 2021-02-05 安徽师范大学 Data transmission optimization method of block chain transaction channel
CN114299711A (en) * 2021-11-26 2022-04-08 北京航空航天大学 Urban traffic vulnerability determination method and system based on attack and defense simultaneous game
CN114627640A (en) * 2022-01-21 2022-06-14 中国科学院深圳先进技术研究院 Dynamic evolution method of intelligent networked automobile driving strategy

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953879A (en) * 2017-05-12 2017-07-14 中国人民解放军信息工程大学 The cyber-defence strategy choosing method of best response dynamics Evolutionary Game Model
CN107135224A (en) * 2017-05-12 2017-09-05 中国人民解放军信息工程大学 Cyber-defence strategy choosing method and its device based on Markov evolutionary Games
CN107483486A (en) * 2017-09-14 2017-12-15 中国人民解放军信息工程大学 Cyber-defence strategy choosing method based on random evolution betting model
CN107566387A (en) * 2017-09-14 2018-01-09 中国人民解放军信息工程大学 Cyber-defence action decision method based on attacking and defending evolutionary Game Analysis
CN108833401A (en) * 2018-06-11 2018-11-16 中国人民解放军战略支援部队信息工程大学 Network active defensive strategy choosing method and device based on Bayes's evolutionary Game
WO2019202437A1 (en) * 2018-04-20 2019-10-24 nChain Holdings Limited Computer-Implemented Methods and Systems For Controlling Tasks Implemented By A Cyclically-Ordered Set Of Nodes Participating In A Blockchain Network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953879A (en) * 2017-05-12 2017-07-14 中国人民解放军信息工程大学 The cyber-defence strategy choosing method of best response dynamics Evolutionary Game Model
CN107135224A (en) * 2017-05-12 2017-09-05 中国人民解放军信息工程大学 Cyber-defence strategy choosing method and its device based on Markov evolutionary Games
CN107483486A (en) * 2017-09-14 2017-12-15 中国人民解放军信息工程大学 Cyber-defence strategy choosing method based on random evolution betting model
CN107566387A (en) * 2017-09-14 2018-01-09 中国人民解放军信息工程大学 Cyber-defence action decision method based on attacking and defending evolutionary Game Analysis
WO2019202437A1 (en) * 2018-04-20 2019-10-24 nChain Holdings Limited Computer-Implemented Methods and Systems For Controlling Tasks Implemented By A Cyclically-Ordered Set Of Nodes Participating In A Blockchain Network
CN108833401A (en) * 2018-06-11 2018-11-16 中国人民解放军战略支援部队信息工程大学 Network active defensive strategy choosing method and device based on Bayes's evolutionary Game

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
DONGWEI GUO,QINGYAO WANG,MINGGUANG YU: "Intelligent Strategy and Average Revenue Ascension in Repeated Game", 《2012 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS》 *
黄健明,张恒巍,王晋东,黄世锐: "基于攻防演化博弈模型的防御策略选取方法", 《通信学报》 *
黄健明,张恒巍: "基于改进复制动态演化博弈模型的最优防御策略选取", 《通信学报》 *
黄健明,张恒巍: "基于随机演化博弈模型的网络防御策略选取方法", 《电子学报》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111988286A (en) * 2020-08-03 2020-11-24 浙江工商大学 DDoS attack analysis and decision method for bitcoin mine pool based on evolutionary game
CN112330019A (en) * 2020-11-04 2021-02-05 安徽师范大学 Data transmission optimization method of block chain transaction channel
CN112330019B (en) * 2020-11-04 2024-03-15 安徽师范大学 Data transmission optimization method for block chain transaction channel
CN112287398A (en) * 2020-12-29 2021-01-29 江苏荣泽信息科技股份有限公司 Block chain network node switching system based on safe storage hardware
CN112287398B (en) * 2020-12-29 2021-04-20 江苏荣泽信息科技股份有限公司 Block chain network node switching system based on safe storage hardware
CN114299711A (en) * 2021-11-26 2022-04-08 北京航空航天大学 Urban traffic vulnerability determination method and system based on attack and defense simultaneous game
CN114299711B (en) * 2021-11-26 2022-11-04 北京航空航天大学 Urban traffic vulnerability determination method and system based on attack and defense simultaneous game
CN114627640A (en) * 2022-01-21 2022-06-14 中国科学院深圳先进技术研究院 Dynamic evolution method of intelligent networked automobile driving strategy

Also Published As

Publication number Publication date
CN111245857B (en) 2021-11-26

Similar Documents

Publication Publication Date Title
CN111245857B (en) Channel network steady state evolution game method in block link environment
Tao et al. On sharding open blockchains with smart contracts
CN107135224B (en) Network defense strategy selection method and device based on Markov evolution game
Hou et al. SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning
Wang et al. A platform-free proof of federated learning consensus mechanism for sustainable blockchains
Zhang et al. Least cost influence maximization across multiple social networks
Nayak et al. Stubborn mining: Generalizing selfish mining and combining with an eclipse attack
Tong et al. Trust-pbft: A peertrust-based practical byzantine consensus algorithm
CN105682174A (en) Opportunity network evolution algorithm and device for promoting node cooperation
Shi et al. Fee-free pooled mining for countering pool-hopping attack in blockchain
He et al. Three-stage stackelberg game enabled clustered federated learning in heterogeneous UAV swarms
CN111294242A (en) Multi-hop learning method for improving cooperation level of multi-agent system
Zhang et al. Dynamic evolutionary game-based modeling, analysis and performance enhancement of blockchain channels
Ding et al. A public goods game theory-based approach to cooperation in VANETs under a high vehicle density condition
Liu et al. Blockchain based offloading strategy: Incentive, effectiveness and security
CN112232844A (en) Block chaining coin mine pool multi-miner cooperative evolution method based on time sequence difference algorithm
Lu et al. Defeat: A decentralized federated learning against gradient attacks
Bai et al. Blockchain mining with multiple selfish miners
Sakhaei et al. Equilibration analysis and control of coordinating decision-making populations
Li et al. Twisted by the pools: Detection of selfish anomalies in proof-of-work mining
Perešíni et al. DAG-oriented protocols PHANTOM and GHOSTDAG under incentive attack via transaction selection strategy
Feng et al. Security analysis of block withholding attacks in blockchain
Kumar et al. Indf: Efficient transaction publishing in blockchain
Zhang et al. Game-theoretic modeling and stability analysis of blockchain channels
Mahatungade et al. Performance analysis of Reinforcement Learning for Miner Selection in Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant